Chord-based Resource Identifier-to-Locator Mapping and Searching for the Future Internet

TELKOMNIKA, Vol.12, No.3, September 2014, pp. 703~710
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v12i3.99

 703

Chord-based Resource Identifier-to-Locator Mapping
and Searching for the Future Internet
Huanlin Liu, Hongyue Dai, Shuaiyong Wu, Sheng Huang
School of Communicaion and Information Engineering, Chongiqng University of Posts and
Telecommunications
Chongwen Road 2#, Nan’an District, Chongqing City, 400065, China
e-mail: liuhl2@sina.com

Abstract
A great many problems, such as scalability, mapping data searching, high frequency update of
mapping data, arise in the future network resource mapping system for its vast data processing need.
Future Network Chord (FN Chord), an algorithm based on Chord and aims at solving the resources identity
mapping and searching problem, is put forward by taking advantage of the qualities of scalability, rapid
searching speed, high searching efficiency and flexible naming of chord in order to solve this problem.
What’s more, an extra interest node index table for FN Chord is designed to record the hotspot resource

mapping location in the paper. So, the resource searching strategy, which is named as Interest Index
Table Future Network Chord (IIT-FN Chord) is proposed to search the resource in the paper. The entropy
weight method is used to calculate the node interest level according the interest nodes’ resource item
online time and visited times and to renew the interest index table. Moreover, probability replacement
method is proposed to replace the outdated item on interest index table with new item. Simulation results
show that the algorithm can decrease the average searching latency, average searching hops and thus
increases the searching efficiency for the resource searching.
Keywords: future internet, chord, interest index table, entropy weight, average searching hops

1. Introduction
With the rapid development of Internet and the quick emergence of mobile Internet,
clouding computing [2], Internet of things [3], the problem of Future Internet constantly occurs
[4], such as the problems of Internet mobility, routing scalability, multi-homing and security.
Many solutions are put forward to satisfy the need of future Internet network, for example,
virtualization network topology [5], redesign content centric network architecture [6], and split
resource identifier and locator [7], etc. What identifier and locator split means is to represent the
double semantic of IP with identifier and locator respectively. At present, the identifier and
locator split architecture, for which the realization of resource identifier mapping service system
[8] is of great importance, is widely studied by worldwide researchers. The core issue to realize
the resource identifiers mapping system is its resource mapping and searching algorithm, which

should be able to satisfy scalability, mass data mapping, update and inquiry, etc.
In the P2P system, the DHT-based resource searching method includes Chord [10],
CAN [11], Pastry [12] and Tapestry [13] in the P2P structured network. The Chord based
method has the advantage of self-organization, scalability, robustness and rapid inquiry for its
distributed hash table based identifier mapping system. So, the technology of Chord may
become one of the promising candidate technologies for the resource searching of future
Internet network. But in the future Internet network, the issues of scalability, quick inquiry, high
frequency mapping and data update will rise in the resource mapping service system for there
will be mass data and application in it. It is found that one of three or so the indexes in the
Chord routing table are repetitive, which reduces the inquiry efficiency and increases the hops
of inquiry [14]. Moreover, a small number of nodes with hotspot information are visited most
often than the vast majority of information access nodes, which leads to long-tail effect of inquiry
data [15] and increases the inquiry average hops and delay. Taking full advantage of Chord, the
Future Network Chord (FN Chord), an improved algorithm of resource identifier mapping and
searching in identifier and locator split future network, is put forward to decrease the average
inquiry delay and the average inquiry hops in the paper. The improved algorithm based on
interest index table in the future network Chord is proposed to solve the long-tail effect problem
Received April 24, 2014; Revised July 7, 2014; Accepted July 25, 2014

704 


ISSN: 1693-6930

for mass data inquiry. By considering both interest nodes online time and accessed times, we
take advantage of both entropy weight algorithm and probability replacement algorithm to
calculate the node’s interest level and to decide which Chord entry to be replaced in the interest
node index table respectively.
2. IT-FN Chord Identifier Mapping Method
To decrease the average searching hops and average searching delays in the future
Internet network, an improved IIT-FN Chord resource identifier mapping and searching
algorithm which is based on interest index table is proposed in the section.
An interest node index table for IIT-FN Chord is designed in table 1 firstly.
Table 1. Structure of interest node index table for one resource item
NID

Node IP and port

NID precusor node

NID successor node


VT

VC

Each node joins the IIT-FN Chord should keep information of its precusor node, its
sucessor node and its finger table. And what’s more, an interest node index table for one item is
formed. In the interest node index table, there must be information about the servers visited by
the current server in this table. It should include items like the IP address and port number of the
NID (Node’s hash Identification), the IP and port number of the predecessor of this NID and the
IP and port number of the successor of this NID in IIT-FN Chord, experienced number of
periods during the item idle times (VT) and item visited times (VC).
Four conditions must be guaranteed in the design of interest index table:
(1) Reasonable table scale;
(2) Hotter node is, more likely node should be in the table 1;
(3) Each new item should be able to join in the table;
(4) Each outdated information should be eliminated from the table as soon as possible.
Firstly, since the SHA-1 is used as the DHT hash function in IIT-FN Chord, there should
be 160 items in the finger table. According to the 20/80 principle, studies show that there are
only 20 items which are frequently inquired in every 100 items. So, we assume that the number

of items in the interest node index table is 160*20%=32.
Secondly, calculate interesting level of each node. The importance of one resource
item, namely its interesting level, is obtained by applying the entropy weight algorithm [16] which
takes both idle time and accessed times into consideration. The i-th item’s interesting level of
node is calculated in equation (1).

Ri  1  VTi   2  VCi

(1)

Where, VTi and VCi represent the node’s item i idle times and visited times,
respectively. Parameters β1 and β2 are the weight coefficient of VT and VC, respectively. VT
and VC are initialized when a new item is added to the node as VT0 and 1, respectively. Here,
VT0 is a big value according to the network’s resource access level, such as we set VT0=32,
VC=1, i=1, 2, …, VT0 at the algorithm’s beginning to evaluate node’s interest for resource item
i. If the node is not visited by other node in one time period for the item i, the item’s VT0
decreases about 1. If the item’s VT reduces to 0, the item i is kicked out of the interest node
index table. If the node is visited by other node in one time period for the item i, the item’s VC
increases about 1. If we calculate all items’ interest level of node, we sort all items according to
each item’s interest level from high to low order.


1 

w1
,  2  1  1
w1  w2

Where, w1 is the entropy weight of VT, and w2 is the entropy weight of VC.

TELKOMNIKA Vol. 12, No. 3, September 2014: 703 – 710

(2)

TELKOMNIKA

ISSN: 1693-6930

 705

2


w1  (1  e1 ) /  (1  e j )
j 1

(3)

The e1 and e2 are the entropy of VT and VC respectively.

e1  

1 VT 0
1 VC
pi1  ln pi1 ; e2  

 pi 2  ln pi 2
lnVT 0 i 1
ln VC i 1

(4)


The pi1 and pi2 are i-th item’s proportion of VT parameter and VC parameter,
respectively.
VT 0

VC

i 1

i 1

pi1  VTi / VTi ; pi 2  VCi /  VCi

(5)

Thirdly, replace one item in the node’s interest index table using the probability
replacement algorithm [17] which takes all the items interesting level as probability judge
criterion. The higher the interest level the item has, the less likely it will be replaced.
Set P is the alternative probability of each item in set R by a new item. Here, set R is
the each item’s interest level of node, and P = {P1, P2, … , PVT0}, R={R1, R2, … , RVT0}. When a
new item is added to the interesting nodes index table, the item’s alternative probability Pi is

initialized as 0.5. The alternative probability of i-th item in the interest index table is designed
as follow.

1 Ri 

2

Pi  0.5* VT 0

 1 R 
i 1

2

i

(6)

According to the equation (6), we know that the larger Ri value of a item, the smaller Pi.
Lastly, we decide whether the node is outdated. An interest node is taken as an outdated node

and will be eliminated from the interest node index table as long as it is not visited for a certain
number of periods. In other words, if one item’s VT of the node is 0, the item is kicked out of the
interest node index table.
3. IIT-FN Chord resource searching
Before we describe the proposed chord-based resource searching strategy, we define
some symbol as follows.
NID represents the ID of a node. VC is visited times of the target node. Usually, VC=1
when a new item is added to the interesting node index table. And VC is added 1 as target node
is visited once. VT indicates the node’s remaining available idle times. Usually, we assume that
the initial value of VT is 32, namely VT0=32 at the beginning. If a target node is not visited
during one period, VT is reduced to 1. If VT=0, then this node is eliminated from the interest
index table immediately. IIT is interest node index table.
When node n in the IIT-FN Chord sends a resource inquiry K, the process of resource
searching is designed as follow.
Step 1: Check IIT to see if there is any invalid or outdated node in it. If there is any,
delete it from the IIT. Renew successor node number and precursor node number of each node
on IIT. Update finger table of each node on IIT-FN Chord.
Step 2: Inquiry the resource K on node n. If resource K is on node n, the resource
searching success and the searching process goes to Step 3. Else if resource K is not on node
n, the resource searching goes to Step 4.


Chord-Based Resource Identifier to Locator Mapping and Searching for .... (Huanlin Liu)

706 

ISSN: 1693-6930

Step 3: Establish a new item to IIT of node n with VT=32, VC=1. If IIT of node n is full,
calling the probability replacement algorithm to replace some item of IIT with this new item. Else
if IIT is not full, the new item is added directly to the IIT.
Step 4: Inquiry the IIT and judge whether the resource K needs only one hop. If n